IT Management  >   Systems Operations  >   Systems Management  >  

Device Management

RSS Feed   
Device Management Reports
 
The state of mobile app security 2020
sponsored by Intertrust
WHITE PAPER: Employees today use 3 different devices in their daily routine – that number is expected to increase as organizations continue to adopt IoT. With the amount of sensitive data within mobile apps, ensuring their protection is paramount. In this report, explore key statistics and strategic insights for mobile app security in 2020.
Posted: 10 Feb 2020 | Published: 10 Feb 2020

Intertrust

Creative Lodging Solutions
sponsored by Absolute Software Corporation
CASE STUDY: In this case study, discover how Creative Lodging Solutions (CLS), a travel management company, partnered with Absolute to establish control and visibility of their endpoints to eliminate blind sports and protect intellectual property.
Posted: 20 Feb 2020 | Published: 15 May 2019

Absolute Software Corporation

Best Practices for Enterprise Phishing Protection
sponsored by PhishLabs
WHITE PAPER: According to the SANS Institute, 95% of data breaches start with phishing attacks. As these attacks become increasingly frequent and difficult to detect, organization’s need to rethink how they reduce the risk of these attacks. Download this white paper to uncover 15 best practices to boost your phishing detection and security.
Posted: 20 Feb 2020 | Published: 20 Feb 2020

PhishLabs

Global Smart Meter Manufacturer Secures Move to Microsoft Intune with Lookout
sponsored by Lookout
CASE STUDY: With organizations growing more reliant on remote access capabilities, endpoint security becomes necessary to meet internal and industry security regulations. In this case study, discover how Landis+Gyr, an energy management leader, developed and deployed an advanced mobile security strategy to protect their endpoints
Posted: 25 Nov 2019 | Published: 25 Nov 2019

Lookout

Ultimate Guide to Bot Management
sponsored by Radware
EBOOK: Bots have completely revolutionized the way we interact digitally. In fact, bots account for more than half of all internet traffic. Unfortunately, some bots play a more sinister role – committing acts of fraud. In this e-book, explore the threats posed by malicious bots and discover tactics for detecting & mitigating these risks.
Posted: 26 Feb 2020 | Published: 26 Feb 2020

Radware

PROACTIVE MOBILE APPSEC:A 2020 GUIDE
sponsored by Data Theorem
WHITE PAPER: When it comes to developing a mobile application security program, organizations struggle to set their priorities, resulting in the suboptimal use of resources. But with data breaches on the rise, application security is more critical than ever. Download this application security guide to help get you started.
Posted: 30 Jan 2020 | Published: 30 Jan 2020

Data Theorem

CW Middle East ezine April 11 2019
sponsored by ComputerWeekly.com
EZINE: It's that time of year again when the Computer Weekly/TechTarget IT Priorities 2019 survey results are out, so in this issue we take a look at some of the findings.
Posted: 05 Apr 2019 | Published: 11 Apr 2019

ComputerWeekly.com

Indiana Charter School Network with Goodwill Industries
sponsored by Absolute Software Corporation
CASE STUDY: Goodwill Industries of Central Indiana is a non-profit social enterprise that partners with the Indiana Charter School Network to support over 3,300 students spread across 11 schools. Learn how Absolute helped the schools and Goodwill decrease theft of devices used by students, maintain network compliance, and better manage hardware inventory.
Posted: 12 Feb 2020 | Published: 12 Feb 2020

Absolute Software Corporation

Shifting from Device Management to Workforce Management
sponsored by Dell and Intel
EGUIDE: Download this e-guide to discover how device hyper-convergence, Devices as a Service, virtualization and cloud computing, help organizations better manage their workforces by focusing more on the users, access, identity and data.
Posted: 13 Feb 2018 | Published: 07 Feb 2018

Dell and Intel

Crafting a Secure Endpoint Management Strategy
sponsored by Vox Mobile Solutions
EGUIDE: Download this e-guide, to learn what steps your IT team can take in order to ensure that there are no gaps in your endpoint security strategy, and avoid potentially detrimental attacks.
Posted: 21 Feb 2019 | Published: 21 Feb 2019

Vox Mobile Solutions
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info